CVE-2025-1686
27.02.2025, 05:15
All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ. Workaround This vulnerability can be mitigated by disabling the include macro in Pebble Templates: java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();Enginsight
Vendor | Product | Version |
---|---|---|
pebbletemplates | pebble | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration